Professional Documents
Culture Documents
Forum Discussion 2 - MIS
Forum Discussion 2 - MIS
Section : MC-013
towards
recovery.
computer in the process.
computerized
information
02 SPYWARE
systems IDENTITY THEFT 05
Malicious software that enters a
Theft of obtaining personal
computer to monitor user's online
information such as social
activities and serve up
security ID, driver’s license and
advertising. Spyware collects
credit card numbers to
personal and sensitive
impersonate someone else.
information and attackers use it
to track, steal, and sell user data.
03 HACKERS &
COMPUTER CRIME
PHISHING
06
Setting up fake Websites or
sending e-mail messages that
People create computer security
look like legitimate businesses to
threats and malware. Their
ask users for confidential
activities include system intrusion,
financial and personal
system damage, cybervandals,
information.
and destruction of Website.
WORMS
07 Independent programs that
EVIL TWINS 10
spreads copies of itself from Is a fake Wi-Fi access point.
computer to computer over a When users connect to this
network. Worms spread by
downloads, e-mail, IM
attachments, and downloads on
Threats access point, all the data they
share with the network passes
towards
through a server controlled by
Websites and social networks. the hacker.
computerized
information
08 TROJAN HORSES
Malware that downloads onto a systems PHARMING 11
computer as a legitimate Slightly similar to phishing but
program. Once downloaded, the pharming redirects users to an
malicious code will execute the attacker-controlled Website,
task the attacker designed it for, even when the individual types
such as spy on users’ or steal the correct Website address.
sensitive data.
Protective
Authentication
measures to Proxy Servers
Procedures
counter threats
Access Automated
Controls Software
Updates